欢迎来到毕设资料网! | 帮助中心 毕设资料交流与分享平台
毕设资料网
全部分类
  • 毕业设计>
  • 毕业论文>
  • 外文翻译>
  • 课程设计>
  • 实习报告>
  • 相关资料>
  • ImageVerifierCode 换一换
    首页 毕设资料网 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    2014年网络信息安全外文翻译--基于云计算的企业信息安全强化方案

    • 资源ID:1391076       资源大小:171.10KB        全文页数:20页
    • 资源格式: DOCX        下载积分:300金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: QQ登录
    下载资源需要300金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

    2014年网络信息安全外文翻译--基于云计算的企业信息安全强化方案

    1、3650 英文单词,英文单词,2 万英文字符万英文字符,中文,中文 6350 字字 文献出处:文献出处:Kang A N, Barolli L, Park J H, et al. A strengthening plan for enterprise information security based on cloud computingJ. Cluster computing, 2014, 17(3): 703-710. A strengthening plan for enterprise information security based on cloud computing An

    2、Na Kang Leonard Barolli Jong Hyuk Park Young-Sik Jeong Abstract Cloud computing environment came about in order to effectively manage and use enormous amount of data that have become available with the development of the Internet. Cloud computing service is widely used not only to manage the users I

    3、T resources, but also to use enterprise IT resources in an effective manner. V arious security threats have occurred while using cloud computing and plans for reaction are much needed, since they will eventually elevate to security threats to enterprise information. Plans to strengthen the security

    4、of enterprise information by using cloud security will be proposed in this research. These cloud computing security measures must be supported by the governmental policies. Publications on guidelines to information protection will raise awareness among the users and service providers. System of reac

    5、tion must be created in order to constantly monitor and to promptly respond to any security accident. Therefore, both technical countermeasures and governmental policy must be supported at the same time. Cloud computing service is expanding more than ever, thus active research on cloud computing sec

    6、urity is expected. Keywords : Cloud computing Cloud security Security threats Enterprise information security 1. Introduction Cloud computing can be defined as Internet-based computing whereby scalable and elastic IT resources are provided to many clients at the same time, as shown Table 1 13. Important characteristics of cloud computing is that, unlike the existing computing service where the user has to own and manage his own IT resources, it provides necessary amount of virt


    注意事项

    本文(2014年网络信息安全外文翻译--基于云计算的企业信息安全强化方案)为本站会员(那***)主动上传,毕设资料网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请联系网站客服QQ:540560583,我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们
    本站所有资料均属于原创者所有,仅提供参考和学习交流之用,请勿用做其他用途,转载必究!如有侵犯您的权利请联系本站,一经查实我们会立即删除相关内容!
    copyright@ 2008-2025 毕设资料网所有
    联系QQ:540560583